6fa4f576849106db60b470ba3fe87cbe0c22d161: Bug 1189967 - Avoid including <string> from Char16.h. r=nfroyd
Mike Hommey <mh+mozilla@glandium.org> - Fri, 21 Aug 2015 16:05:40 +0900 - rev 291533
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1189967 - Avoid including <string> from Char16.h. r=nfroyd Since Char16.h is included everywhere, and MSVC 2015 uses the char16ptr_t trick it contains, we include <string> everywhere, but that has the side effect of breaking the build in subtle ways. One way around this would be to avoid including Char16.h in the first place, but that requires more work than I was ready to put in. So instead, just avoid including <string> by removing the conversion operator for std::wstring.
73bd8b894c6bf6b07b4a94afb87af187d013c5aa: Bug 1189967 - Be slightly more explicit about some conversions to std::wstring. r=nfroyd
Mike Hommey <mh+mozilla@glandium.org> - Fri, 21 Aug 2015 16:01:47 +0900 - rev 291532
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1189967 - Be slightly more explicit about some conversions to std::wstring. r=nfroyd
ff478557098fff77c343431da173edafc6c04be4: Bug 1167986 - TEST-UNEXPECTED-FAIL | xpcshell-unpack.ini:toolkit/mozapps/extensions/test/xpcshell/test_signed_install.js (and signing failures) - missing review comments
Philipp Kewisch <mozilla@kewis.ch> - Sun, 23 Aug 2015 12:04:40 +0200 - rev 291531
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1167986 - TEST-UNEXPECTED-FAIL | xpcshell-unpack.ini:toolkit/mozapps/extensions/test/xpcshell/test_signed_install.js (and signing failures) - missing review comments
a42aeadfced446f49acddbedde54d214a589dcbd: Bug 1167986 - TEST-UNEXPECTED-FAIL | xpcshell-unpack.ini:toolkit/mozapps/extensions/test/xpcshell/test_signed_install.js (and signing failures). r=gps
Philipp Kewisch <mozilla@kewis.ch> - Sun, 23 Aug 2015 11:54:44 +0200 - rev 291530
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1167986 - TEST-UNEXPECTED-FAIL | xpcshell-unpack.ini:toolkit/mozapps/extensions/test/xpcshell/test_signed_install.js (and signing failures). r=gps
4a470b936bf334846a980ecc3303b1cd8bcc3509: Typo fix in comment generated by gen-usercounters.py; no bug, no review.
Cameron McCormack <cam@mcc.id.au> - Sun, 23 Aug 2015 16:42:07 +1000 - rev 291529
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Typo fix in comment generated by gen-usercounters.py; no bug, no review. DONTBUILD
2bbffbd9aef30a864e71ca8317e2c76f06bd8d54: Bug 1181555 - Add 'experimental-webcomponents' permission. r=fabrice
Chris Lord <chrislord.net@gmail.com> - Thu, 20 Aug 2015 12:07:54 +0100 - rev 291528
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1181555 - Add 'experimental-webcomponents' permission. r=fabrice
d8159e66db6c29c98dc7a8643defdb321adefbc9: Bug 1191432 - improving coverage for marionette accessibility checks. r=automatedtester
Yura Zenevich <yzenevich@mozilla.com> - Wed, 05 Aug 2015 14:40:18 -0400 - rev 291527
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1191432 - improving coverage for marionette accessibility checks. r=automatedtester
b1bd7b7c0d13976e001d15d5f32f531f1b7441de: Backed out changeset e9d838084096 (bug 1181555) for Linux x64 opt and B2G Desktop Linux x64 opt Hazard analysis fail. r=backout
Sebastian Hengst <archaeopteryx@coole-files.de> - Sat, 22 Aug 2015 21:53:48 +0200 - rev 291526
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Backed out changeset e9d838084096 (bug 1181555) for Linux x64 opt and B2G Desktop Linux x64 opt Hazard analysis fail. r=backout
e9d8380840961d73b0f2cb5d9cd2d5818acbb11a: Bug 1181555 - Add 'moz-extremely-unstable-and-will-change-webcomponents' permission. r=fabrice
Chris Lord <chrislord.net@gmail.com> - Thu, 20 Aug 2015 12:07:54 +0100 - rev 291525
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1181555 - Add 'moz-extremely-unstable-and-will-change-webcomponents' permission. r=fabrice
994e010d0a0341cfbefe07121a42bc47f97e0e85: Bug 1196638 - Infer the proper button for synthesized mouse clicks on all callsites. r=jmaher
Bobby Holley <bobbyholley@gmail.com> - Wed, 19 Aug 2015 22:45:21 -0700 - rev 291524
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1196638 - Infer the proper button for synthesized mouse clicks on all callsites. r=jmaher
dab1cbe3f0ed35e16496ba28bb62e297c81c1881: Bug 1197483 - update talos.json to pick up the latest changes. r=parkouss
Joel Maher <jmaher@mozilla.com> - Sat, 22 Aug 2015 12:03:17 -0400 - rev 291523
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1197483 - update talos.json to pick up the latest changes. r=parkouss
a7b04b9e4f17de3f5010b6cc53032517efbfa570: Bug 889158 part 1 - Fix chrome and tests to not use arrow functions with arguments. r=Waldo
Jan de Mooij <jdemooij@mozilla.com> - Sat, 22 Aug 2015 13:49:11 +0200 - rev 291522
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 889158 part 1 - Fix chrome and tests to not use arrow functions with arguments. r=Waldo
6eaeb32125f4ce179182e8742e0cb43c6251ebc8: Bug 930843 part.2 NS_UI_ACTIVATE event should be trusted event even if it's caused by an untrusted event r=smaug
Masayuki Nakano <masayuki@d-toybox.com> - Sat, 22 Aug 2015 13:02:39 +0900 - rev 291521
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 930843 part.2 NS_UI_ACTIVATE event should be trusted event even if it's caused by an untrusted event r=smaug
2518b11aca2618c587702399b5fc9749f27e02ea: Bug 930843 part.1 Add test for checking isTrust attribute value of DOMActivate event r=smaug
Masayuki Nakano <masayuki@d-toybox.com> - Sat, 22 Aug 2015 13:02:39 +0900 - rev 291520
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 930843 part.1 Add test for checking isTrust attribute value of DOMActivate event r=smaug
8a5579a007a9e78fe78bd83b4dce4a2a3dc53bf3: Bug 1194519 - call AsyncOpen2 within child and parent if securityFlags are present (r=jduell)
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Fri, 21 Aug 2015 20:33:56 -0700 - rev 291519
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1194519 - call AsyncOpen2 within child and parent if securityFlags are present (r=jduell)
2cd404b76aa4a9fd977e4bfb1908c2fc83dc390b: Bug 1196057 - Use channel->Open2() in dom/base/nsFrameMessageManager.cpp (r=sicking)
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Fri, 21 Aug 2015 20:33:23 -0700 - rev 291518
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1196057 - Use channel->Open2() in dom/base/nsFrameMessageManager.cpp (r=sicking)
0ea231b65b0dda1966951b868192c29d42177ce7: Bug 1197002 - Use channel->Open2() in editor/libeditor/nsHTMLDataTransfer.cpp (r=sicking)
Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> - Fri, 21 Aug 2015 20:33:42 -0700 - rev 291517
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1197002 - Use channel->Open2() in editor/libeditor/nsHTMLDataTransfer.cpp (r=sicking)
d21781bad98b4044a1c525ad3dc845f70b64106d: Bug 1195755: Don't assert recursion depth sanity on Mac, because there is none. r=me
Kyle Huey <khuey@kylehuey.com> - Fri, 21 Aug 2015 19:56:56 -0700 - rev 291516
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1195755: Don't assert recursion depth sanity on Mac, because there is none. r=me
6e3e2cc1988e312b6793b588ac0a5e52f2c08efd: Bug 1105827 - Add test for invalid query. r=me
Birunthan Mohanathas <birunthan@mohanathas.com> - Fri, 21 Aug 2015 19:53:29 -0700 - rev 291515
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1105827 - Add test for invalid query. r=me
413c77eaef08bb8ea7a745e1274c3ea0e91f55cd: Bug 1105827 - Part 11: Use nsRefPtr to store PermissionStatus. r=baku
Birunthan Mohanathas <birunthan@mohanathas.com> - Fri, 31 Jul 2015 14:56:59 -0700 - rev 291514
Push 5245 by raliiev@mozilla.com at Thu, 29 Oct 2015 11:30:51 +0000
Bug 1105827 - Part 11: Use nsRefPtr to store PermissionStatus. r=baku
(0) -100000 -30000 -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 +10000 +30000 +100000 tip